Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (345)

Search Parameters:
Keywords = identity vulnerability

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 34237 KiB  
Article
Exploring Connectivity Dynamics in Historical Districts of Mountain City: A Case Study of Construction and Road Networks in Guiyang, Southwest China
by Zhixin Lin, Zongsheng Huang, Huiwen Xiang, Shaowei Lu, Yuanduo Chen and Jiachuan Yang
Sustainability 2025, 17(6), 2376; https://doi.org/10.3390/su17062376 (registering DOI) - 8 Mar 2025
Viewed by 8
Abstract
As urbanization accelerates globally, preserving and developing historical cultural districts is increasingly critical, especially in areas with unique historical and cultural value. To understand the development of urban construction and the diachronic and spatial patterns of development, this paper focuses on Guiyang, a [...] Read more.
As urbanization accelerates globally, preserving and developing historical cultural districts is increasingly critical, especially in areas with unique historical and cultural value. To understand the development of urban construction and the diachronic and spatial patterns of development, this paper focuses on Guiyang, a key transportation hub in Southwest China connected to Southeast Asia. It examines the historical districts from four representative periods: the early Ming Dynasty (1413–1420), the early Qing Dynasty (1616–1626), the Republican era (1912–1949), and the 1980s (1980–1990). Employing complex network analysis, the study investigates the changes in the connectivity characteristics of construction land and road networks. Key findings reveal: (1) Stability: The construction land networks stability decreased steadily from the early Ming period to the 1980s, whereas the road network density exhibited a wave-like decline. (2) Centrality: The construction land networks centrality decreased linearly, and the road network density exhibited a wave-like decrease. (3) Vulnerability: Both networks showed increased vulnerability, with fluctuations in the road network during the early Qing period, but generally reduced vulnerability. The analysis also indicates that changes in the connectivity of Guiyang’s historical district construction land and road networks are influenced by shifts in social structures, improvements in productivity, and the physical geography of the area. In mountainous cities with limited terrain, urban forms have transitioned from single-center aggregation to multi-center aggregation, and areas where administrative expansion is not feasible have adopted compact spatial development strategies. The application of complex network analysis has proven effective in urban spatial studies, revealing that changes in construction land and road networks reflect multifaceted internal transformations in society, politics, economy, military, and culture, significantly impacting the formation of a diverse yet unified national identity. Based on these findings, this paper offers recommendations for the planning and development of mountainous cities globally. Full article
Show Figures

Figure 1

Figure 1
<p>Location Map of Guiyang City.</p>
Full article ">Figure 2
<p>Data Processing Flowchart.</p>
Full article ">Figure 3
<p>Density Values Construction Land and Road Networks across Four Periods.</p>
Full article ">Figure 4
<p>Depicts the descending line chart of intermediary centrality for construction land spatial networks and road networks in four historical periods.</p>
Full article ">
24 pages, 1526 KiB  
Article
The Role of Threat, Meaning, and Religion in Political Grief
by Darcy Harris
Religions 2025, 16(3), 321; https://doi.org/10.3390/rel16030321 - 4 Mar 2025
Viewed by 230
Abstract
Grief is often seen as a personal response to losing a loved one, but it can also arise from the loss of deeply held values and identities linked to social, structural, and religious spheres. Political grief is a unique form of this, stemming [...] Read more.
Grief is often seen as a personal response to losing a loved one, but it can also arise from the loss of deeply held values and identities linked to social, structural, and religious spheres. Political grief is a unique form of this, stemming from political policies, laws, and social messaging that certain groups perceive as losses. As societies face political decisions and systemic failures, grief can emerge from losing trust in institutions, shared beliefs, and a sense of belonging. An outgrowth of political grief is a strain on relationships due to polarization, heightened by threat-activating events and resulting tensions. Many people turn to religion to counter feelings of vulnerability and incoherence in today’s political climate. While this may relieve anxiety and provide stability, it can also exacerbate some sources of grief. Understanding these dimensions is crucial for addressing political grief’s broader implications, as individuals and communities seek meaning and attempt to rewrite their narratives in adversity. This discussion includes defining grief beyond death-loss and exploring the interplay between social/political structures and culture. It also considers specific threats and responses, including religious alignment, focusing on recent events in the United States. Full article
(This article belongs to the Special Issue Religious Perspectives on Ecological, Political, and Cultural Grief)
Show Figures

Figure 1

Figure 1
<p>Aspects of the Assumptive World.</p>
Full article ">Figure 2
<p>PCS Analysis (adapted from (<a href="#B67-religions-16-00321" class="html-bibr">Thompson 2021</a>)).</p>
Full article ">Figure 3
<p>Examples of Sources of Political Grief.</p>
Full article ">
30 pages, 9877 KiB  
Article
A Methodological Framework for Assessing Overtourism in Insular Territories—Case Study of Santorini Island, Greece
by Akrivi Leka, Apostolos Lagarias, Anastasia Stratigea and Panayiotis Prekas
ISPRS Int. J. Geo-Inf. 2025, 14(3), 106; https://doi.org/10.3390/ijgi14030106 - 1 Mar 2025
Viewed by 343
Abstract
This paper aims at addressing sustainability concerns in vulnerable insular territories. Such concerns are due to the rising overtourism phenomenon that affects islands at a rapidly escalating pace and renders sustainable local development of these outstanding areas—from a natural and cultural viewpoint—at stake. [...] Read more.
This paper aims at addressing sustainability concerns in vulnerable insular territories. Such concerns are due to the rising overtourism phenomenon that affects islands at a rapidly escalating pace and renders sustainable local development of these outstanding areas—from a natural and cultural viewpoint—at stake. Towards this end, this work capitalizes on current literature and attempts to structure a methodological framework and a respective set of indicators’ groups that are capable of assessing dimensions of overtourism in each single tourism destination, thus providing evidence-based and more robust guidelines for articulating policy decisions that can remedy incidents of overtourism. The proposed methodological framework follows a place-based approach and combines tourism demand and supply data with environmental, social, economic and spatial data and respective indicators for assessing the tourism density and intensity of each destination’s tourism pattern and related multi-dimensional impacts. Validation of both the proposed framework and indicators’ groups is conducted in Santorini Island, Greece, i.e., an island that lies at top positions of many lists of destinations, marked as suffering by overtourism. Results show that Santorini Island is confronted with severe overtourism impacts, which are highly affecting its identity, productive model and spatial pattern, while endangering its natural and cultural wealth. Full article
Show Figures

Figure 1

Figure 1
<p>Types/groups of indicators for assessing the overtourism phenomenon. Source: Own elaboration.</p>
Full article ">Figure 2
<p>Steps of the methodological framework for assessing and monitoring overtourism. Source: Own elaboration.</p>
Full article ">Figure 3
<p>Location of Thera Municipality in the Greek territory. Source: Own elaboration.</p>
Full article ">Figure 4
<p>Dynamics of tourism supply in the time span 2012–2023. Source: Own elaboration based on data from the Institute of the Association of Greek Tourism Enterprises [<a href="#B54-ijgi-14-00106" class="html-bibr">54</a>] and the Hellenic Chamber of Hotels [<a href="#B56-ijgi-14-00106" class="html-bibr">56</a>].</p>
Full article ">Figure 5
<p>Spatial pattern of tourism accommodation. (<b>a</b>) Kernel density estimation of hotel accommodation (radius 1000 m) in 2023. Source: Own elaboration based on data from the Hellenic Chamber of Hotels [<a href="#B56-ijgi-14-00106" class="html-bibr">56</a>]. (<b>b</b>) Kernel density estimation of Airbnb accommodation (radius 1000 m) in 2023. Source: Own elaboration based on data from the Airbnb Platform [<a href="#B55-ijgi-14-00106" class="html-bibr">55</a>].</p>
Full article ">Figure 6
<p>Pattern of built-up space in 2018. Source: Own elaboration based on Coastal Zones Land Cover/Land Use 2018 [<a href="#B52-ijgi-14-00106" class="html-bibr">52</a>].</p>
Full article ">Figure 7
<p>The dynamics of tourism demand in the Municipality of Thera. (<b>a</b>) Arrivals in Santorini airport in the time span 2016–2023. Source: Own elaboration by the use of data from JTR-Airport.gr [<a href="#B58-ijgi-14-00106" class="html-bibr">58</a>]. (<b>b</b>) Arrivals in hotel accommodations in the Municipality of Thera 2010–2022. Source: Own elaboration by the use of data from the Hellenic Statistical Authority (ELSTAT) [<a href="#B53-ijgi-14-00106" class="html-bibr">53</a>]. (<b>c</b>) No. of arrivals by cruise ships in Santorini Island in the time span 2013–2022. Source: Own elaboration by the use of data from the Institute of the Association of Greek Tourism Enterprises (INSETE) [<a href="#B54-ijgi-14-00106" class="html-bibr">54</a>] and the Hellenic Ports Association [<a href="#B59-ijgi-14-00106" class="html-bibr">59</a>]. (<b>d</b>) No. of cruise ships in the time span 2013–2022. Source: Own elaboration by the use of data from the Institute of the Association of Greek Tourism Enterprises (INSETE) [<a href="#B54-ijgi-14-00106" class="html-bibr">54</a>] and the Hellenic Ports Association [<a href="#B59-ijgi-14-00106" class="html-bibr">59</a>].</p>
Full article ">Figure 8
<p>Mapping of the geospatial indicators EN1, EN2, EN4, and EC3 (as defined in <a href="#ijgi-14-00106-t003" class="html-table">Table 3</a>) in the six administrative zones of Santorini Island (* in EC3 implies multiplication). Source: Own elaboration.</p>
Full article ">Figure 9
<p>NDVI loss in comparison to vineyards in Santorini Island. Source: Own elaboration from Coastal Zones Land Use/Land Cover database [<a href="#B52-ijgi-14-00106" class="html-bibr">52</a>] and Sentinel-2 images.</p>
Full article ">Figure 10
<p>Overlay of the newest available Sentinel-2 image (September 2024) with the vineyards, showing some new built-up developments within the fields. Source: Own elaboration from Coastal Zones Land Use/Land Cover database [<a href="#B52-ijgi-14-00106" class="html-bibr">52</a>] and Sentinel-2 images.</p>
Full article ">
16 pages, 1354 KiB  
Article
A Snapshot of Antimicrobial Resistance in Semi-Wild Oryx: Baseline Data from Qatar
by Asma Mushahidur Rahman, Salma E. Ahmed, Shayma A. Osman, Radhia A. Al-Haddad, Abdallah Almiski, Ristha Kamar, Hana Abdelrahman, Issmat I. Kassem, Andrea Dogliero and Nahla O. Eltai
Antibiotics 2025, 14(3), 248; https://doi.org/10.3390/antibiotics14030248 - 1 Mar 2025
Viewed by 256
Abstract
Background/Objectives: The spread of antimicrobial resistance (AMR) is a growing global health concern. Wild animals can play an important role in the amplification and dissemination of AMR and in conservation efforts aiming at controlling diseases in vulnerable wild animal populations. These animals [...] Read more.
Background/Objectives: The spread of antimicrobial resistance (AMR) is a growing global health concern. Wild animals can play an important role in the amplification and dissemination of AMR and in conservation efforts aiming at controlling diseases in vulnerable wild animal populations. These animals can serve as reservoirs for antibiotic resistance genes and are key in the spread of AMR across ecosystems and hosts. Therefore, monitoring AMR in wild animals is crucial in tackling the spread of resistance in the environment and human population. This study investigated the phenotypic and genotypic resistance of Escherichia coli (E. coli) isolated from semi-wild oryx (Oryx leucoryx) in Qatar. Methods: One hundred fecal samples were collected from oryx in diverse natural reserves across Qatar. A selective agar medium was used to isolate E. coli, and the identity of the isolates was further confirmed using the VITEK® 2 Compact system. The Kirby–Bauer disk diffusion method was used to test antibiotic susceptibility. Genetic resistance determinants were identified through polymerase chain reaction (PCR) analyses and sequencing using the Oxford Nanopore Technology (ONT). Results: The results revealed that 18% (n = 18) of the samples harbored E. coli with resistance to a single antibiotic, 28% (n = 28) were resistant to at least one antibiotic, and 2% (n = 2) were multidrug-resistant (MDR). No resistance was observed against colistin. tetA and tetB encode tetracycline resistance were the most frequently detected genes (57.7%). Whole genome sequencing (WGS) was used to expand on AMR gene-PCR analyses and analyze the resistome of 12E. coli isolates. WGS identified several important antibiotic resistance determinates, including blaCTX-M-encoding Extended Spectrum Beta-Lactamase (ESBL) resistance, soxR associated with tetracycline target alteration, and mdtE, emrB, AcrE, mdtF, and marA related to ciprofloxacin efflux pump resistance. Conclusions: This study provides essential information regarding AMR in Qatari semi-wild animals, which will guide conservation strategies and wildlife health management in a world experiencing increasing antibiotic-resistant infections. Furthermore, these findings can inform policies to mitigate AMR spread, improve ecosystems, and enhance public and environmental health while paving the way for future research on AMR dynamics in wildlife. Full article
(This article belongs to the Special Issue Antimicrobial Resistance in Veterinary Science, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>The percentages of resistance to each antibiotic and multidrug resistance (MDR) in <span class="html-italic">E. coli</span> isolated from <span class="html-italic">Oryx leucoryx</span>. AMP: Ampicillin; CIP: Ciprofloxacin; TE: Tetracycline; SXT: Trimethoprim/Sulfamethoxazole; CTX: Cefotaxime. MDR: multidrug-resistant.</p>
Full article ">Figure 2
<p>(<b>a</b>) The percentages of resistant <span class="html-italic">E. coli</span> isolates (out of 28 resistant isolates from a total of 100) among males and females from Qatari semi-wild Oryx leucoryx. Using SPSS statistical software, a higher percentage of resistance was detected among females than males, with 64.3% (<span class="html-italic">n</span> = 18/28) and 35.7% (<span class="html-italic">n</span> = 10/28), respectively. This difference was not statistically significant (<span class="html-italic">p</span> &gt; 0.05). (<b>b</b>) Comparing the number of resistant <span class="html-italic">E. coli</span> isolates among different age groups and genders. The adult males showed a higher resistance percentage than adult females. ns: not significant.</p>
Full article ">Figure 3
<p>The percentages of resistant <span class="html-italic">E. coli</span> isolates across northwestern, central, and southwestern locations. The results did not show statistically significant differences. The highest percentage of resistance was detected in the central region. ns: not significant.</p>
Full article ">Figure 4
<p>The percentage of genes associated with the phenotypic resistance to 2 antibiotics, tetracycline and ampicillin, was determined using gene-specific PCR. The “Other Genes” were determined using WGS and are listed in <a href="#antibiotics-14-00248-t002" class="html-table">Table 2</a>.</p>
Full article ">Figure 5
<p>A full view of the studied Arabian Oryx along with two images depicting the sample collection process in this study.</p>
Full article ">
13 pages, 863 KiB  
Article
Quantum-Resistant Cryptography for Smart Metering in Smart Grid Systems
by Janusz Jabłoński and Robert Dylewski
Energies 2025, 18(5), 1204; https://doi.org/10.3390/en18051204 - 28 Feb 2025
Viewed by 197
Abstract
The article proposes a cryptographic system with absolute security features for use in authenticating access to resources in smart grid systems, taking into account prosumer solutions to ensure a high level of security of transactions on the energy market that meet the requirements [...] Read more.
The article proposes a cryptographic system with absolute security features for use in authenticating access to resources in smart grid systems, taking into account prosumer solutions to ensure a high level of security of transactions on the energy market that meet the requirements established in the Directive of the European Parliament of 14 December 2022 no. 2555 NIS2, requiring “dynamic authentication” prior to the release of transaction data for key services, covers energy market operators as a key service and is particularly important for ensuring security. The article presents an innovative cryptographic system that, according to the authors’ knowledge, is the only one in the world that meets the NIS2 requirements in the field of “dynamic authentication” and the Quantum-Resistant requirements intended for distributed systems and smart grids. The proposed solution eliminates vulnerabilities related to digital identity theft and its reuse, i.e., practically eliminates the possibility of impersonation. Full article
(This article belongs to the Section A1: Smart Grids and Microgrids)
Show Figures

Figure 1

Figure 1
<p>Shared secret Pass encryption authentication.</p>
Full article ">Figure 2
<p>RSA encryption authentication with shared secret <span class="html-italic">m<sub>i</sub></span> one-time keys.</p>
Full article ">
27 pages, 3723 KiB  
Article
SESAME: Automated Security Assessment of Robots and Modern Multi-Robot Systems
by Manos Papoutsakis, George Hatzivasilis, Emmanouil Michalodimitrakis, Sotiris Ioannidis, Maria Michael, Antonis Savva, Panagiota Nikolaou, Eftychia Stokkou and Gizem Bozdemir
Electronics 2025, 14(5), 923; https://doi.org/10.3390/electronics14050923 - 26 Feb 2025
Viewed by 254
Abstract
As robotic systems become more integrated into our daily lives, there is growing concern about cybersecurity. Robots used in areas such as autonomous driving, surveillance, surgery, home assistance, and industrial automation can be vulnerable to cyber-attacks, which could have serious real-world consequences. Modern [...] Read more.
As robotic systems become more integrated into our daily lives, there is growing concern about cybersecurity. Robots used in areas such as autonomous driving, surveillance, surgery, home assistance, and industrial automation can be vulnerable to cyber-attacks, which could have serious real-world consequences. Modern robotic systems face a unique set of threats due to their evolving characteristics. This paper outlines the SESAME project’s methodology for the automated security analysis of multi-robot systems (MRS) and the production of Executable Digital Dependability Identities (EDDIs). Addressing security challenges in MRS involves overcoming complex factors such as increased connectivity, human–robot interactions, and a lack of risk awareness. The proposed methodology encompasses a detailed process, starting from system description and vulnerability identification and moving to the generation of attack trees and security EDDIs. The SESAME security methodology leverages structured repositories like Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), and Common Attack Pattern Enumeration and Classification (CAPEC) to identify potential vulnerabilities and associated attacks. The introduction of Template Attack Trees facilitates modeling potential attacks, helping security experts develop effective mitigation strategies. This approach not only identifies, but also connects, specific vulnerabilities to possible exploits, thereby generating comprehensive security assessments. By merging safety and security assessments, this methodology ensures the overall dependability of MRS, providing a robust framework to mitigate cyber–physical threats. Full article
(This article belongs to the Special Issue Cyber-Physical Systems: Recent Developments and Emerging Trends)
Show Figures

Figure 1

Figure 1
<p>SESAME security methodology.</p>
Full article ">Figure 2
<p>Example graph that can be produced utilizing the CanFollow relationship of CAPEC.</p>
Full article ">Figure 3
<p>Questionnaire wizard.</p>
Full article ">Figure 4
<p>RVD Java classes of the custom RVD parser.</p>
Full article ">Figure 5
<p>CAPEC classes of the custom CAPEC identifier.</p>
Full article ">Figure 6
<p>Template Attack Tree with cyber and physical vulnerabilities.</p>
Full article ">Figure 7
<p>Area mapping with two UAVs (leader UAV and another UAV).</p>
Full article ">Figure 8
<p>(<b>A</b>) TIAGo Family and (<b>B</b>) TIAGo BASE Family.</p>
Full article ">Figure 9
<p>Example Template Attack Tree.</p>
Full article ">
24 pages, 432 KiB  
Article
Vulnerability Assessment of the Prefabricated Building Supply Chain Based on Set Pair Analysis
by Jinjin Li, Lan Luo and Zhangsheng Liu
Buildings 2025, 15(5), 722; https://doi.org/10.3390/buildings15050722 - 24 Feb 2025
Viewed by 151
Abstract
In recent years, the disruption of the prefabricated building supply chain has led to increased construction period delays and cost overruns, limiting the development and popularization of prefabricated buildings in China. Therefore, this study established a vulnerability evaluation index system for the prefabricated [...] Read more.
In recent years, the disruption of the prefabricated building supply chain has led to increased construction period delays and cost overruns, limiting the development and popularization of prefabricated buildings in China. Therefore, this study established a vulnerability evaluation index system for the prefabricated building supply chain using the driving force–pressure–state–impact–response (DPSIR) framework. We employed the intuitionistic fuzzy analytic hierarchy process (IFAHP), the projection pursuit (PP) model, and variable weight theory to determine the indicator weights. The IFAHP was utilized to reduce the subjectivity in weight assignment and to obtain the degree of membership, non-membership, and hesitation of experts in evaluating the importance of indicators. The PP model was used to determine objective weights based on the structure of the evaluation data, and variable weight theory was applied to integrate subjective and objective weights according to management needs. We utilized Set Pair Analysis (SPA) to establish a vulnerability evaluation model for the building supply chain, treating evaluation data and evaluation levels as a set pair. By analyzing the degree of identity, difference, and opposition of the set pair, we assessed and predicted the vulnerability of the building supply chain. Taking the Taohua Shantytown project in Nanchang as a case study, the results showed that the primary index with the greatest influence on the vulnerability of the prefabricated building supply chain was the driving force, with a weight of 0.2692, followed by the secondary indices of market demand and policy support, with weights of 0.0753 and 0.0719, respectively. The project’s average vulnerability rating was moderate (Level III), and it showed an improvement trend. During the project’s implementation, the total cost overrun of the prefabricated building supply chain was controlled within 5% of the budget, the construction period delay did not exceed 7% of the plan, and the rate of production safety accidents was below the industry average. The results demonstrated that the vulnerability assessment method for the prefabricated building supply chain based on SPA comprehensively and objectively reflected the vulnerability of the supply chain. It is suggested to improve the transparency and flexibility of the supply chain, strengthen daily management within the supply chain, and enhance collaboration with supply chain partners to reduce vulnerability. Full article
(This article belongs to the Special Issue Advances in Life Cycle Management of Buildings)
Show Figures

Figure 1

Figure 1
<p>Technology roadmap.</p>
Full article ">
19 pages, 1061 KiB  
Article
Decentralized Trace-Resistant Self-Sovereign Service Provisioning for Next-Generation Federated Wireless Networks
by Efat Fathalla and Mohamed Azab
Information 2025, 16(3), 159; https://doi.org/10.3390/info16030159 - 20 Feb 2025
Viewed by 242
Abstract
With the advent of NextG wireless networks, the reliance on centralized identity and service management systems poses significant challenges, including limited interoperability, increased privacy vulnerabilities, and the risk of unauthorized tracking or monitoring of user activity. To address these issues, there is a [...] Read more.
With the advent of NextG wireless networks, the reliance on centralized identity and service management systems poses significant challenges, including limited interoperability, increased privacy vulnerabilities, and the risk of unauthorized tracking or monitoring of user activity. To address these issues, there is a critical need for a decentralized framework that empowers users with self-sovereignty over their subscription information while maintaining trust and privacy among network entities. This article presents a novel framework to enable Self-Sovereign Federated NextG (SSFXG) wireless communication networks. The SSFXG framework separates identity management from the service management layer typically controlled by network operators to foster interoperability functionalities with enhanced privacy and trace-resistant assurances in the NextG landscape. The proposed model relies on blockchain technology as an infrastructure to enable single-authority-free service provisioning and boost mutual trust among federated network components. Further, the SSFXG framework facilitates subscribers’ self-sovereignty over their subscription information while ensuring anonymity and enhanced privacy preservation, avoiding unnecessary network activity monitoring or tracking. Preliminary evaluations demonstrated the effectiveness and efficiency of the proposed framework, making it a promising solution for advancing secure and interoperable NextG wireless networks. Full article
(This article belongs to the Special Issue Cybersecurity, Cybercrimes, and Smart Emerging Technologies)
Show Figures

Figure 1

Figure 1
<p>Proposed federated NextG NWs: High-level architecture and system components.</p>
Full article ">Figure 2
<p>Subscribers’ identity issuance and credentials storage and management stages.</p>
Full article ">Figure 3
<p>Subscription identity verification stage.</p>
Full article ">Figure 4
<p>NW service provisioning bidding scenario.</p>
Full article ">Figure 5
<p>Voice call requesting service.</p>
Full article ">Figure 6
<p>System scalability analysis.</p>
Full article ">Figure 7
<p>Operational cost analysis.</p>
Full article ">
24 pages, 457 KiB  
Article
Under Pressure: Gifted Students’ Vulnerabilities, Stressors, and Coping Mechanisms Within a High Achieving High School
by Addison Helsper, Lillian DeShon, Laura E. Boylan, James Galliher and Lisa DaVia Rubenstein
Behav. Sci. 2025, 15(2), 235; https://doi.org/10.3390/bs15020235 - 18 Feb 2025
Viewed by 582
Abstract
This qualitative study explores the interactions among gifted students’ vulnerabilities, stressors, supports, and coping mechanisms at a public, high-achieving residential high school. Qualitative interviews (n = 12) revealed that teachers caused stress by (a) failing to provide academic challenges and/or (b) failing [...] Read more.
This qualitative study explores the interactions among gifted students’ vulnerabilities, stressors, supports, and coping mechanisms at a public, high-achieving residential high school. Qualitative interviews (n = 12) revealed that teachers caused stress by (a) failing to provide academic challenges and/or (b) failing to support students’ diverse identities; conversely, teachers provided support when they were available, enthusiastic, and understanding. Further, peers added stress through class rank competition but fostered support through accepting diverse identities and building friendships. In general, students heavily relied on problem-focused coping to address academic stress (e.g., changing schools, advocacy), yet had minimal adaptative coping strategies to address social stress. Students also discussed hybrid coping approaches, like extracurriculars and counseling. These findings suggest that interventions, such as teacher training and peer support programs, should address specific vulnerabilities, including diverse identities, and provide direct instruction in developing coping strategies to address social stressors. Full article
Show Figures

Figure 1

Figure 1
<p>Thematic results for research questions.</p>
Full article ">
18 pages, 1136 KiB  
Article
Lightweight Secure Communication Supporting Batch Authentication for UAV Swarm
by Pengbin Han, Aina Sui and Jiang Wu
Drones 2025, 9(2), 139; https://doi.org/10.3390/drones9020139 - 13 Feb 2025
Viewed by 417
Abstract
In recent years, with the widespread application of UAV swarm, the security problems faced have been gradually discovered, such as the lack of reliable identity authentication, which makes UAVs vulnerable to invasion. To solve these security problems, a lightweight secure communication scheme supporting [...] Read more.
In recent years, with the widespread application of UAV swarm, the security problems faced have been gradually discovered, such as the lack of reliable identity authentication, which makes UAVs vulnerable to invasion. To solve these security problems, a lightweight secure communication scheme supporting batch authentication for UAV swarm is proposed. Firstly, a layered secure communication model for UAV swarm is designed. Then, a secure transmission protocol is implemented by using elliptic curves under this model, which not only reduces the number of encryptions but also ensures the randomness and one-time use of the session key. Moreover, a UAV identity authentication scheme supporting batch signature verification is proposed, which improves the efficiency of identity authentication. The experiments show that, when the number of UAVs is 60, the computation cost of the proposed scheme is 0.071 s, and the communication cost is 0.203 s, fully demonstrating the efficiency and practicability of the scheme. Through comprehensive security analysis, the capability of the proposed scheme to resist various attacks is demonstrated. Full article
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>Comparison of communication delay with existing schemes [<a href="#B25-drones-09-00139" class="html-bibr">25</a>].</p>
Full article ">Figure 3
<p>Comparison of communication delay with existing schemes [<a href="#B28-drones-09-00139" class="html-bibr">28</a>].</p>
Full article ">Figure 4
<p>Comparison of communication delay with existing schemes [<a href="#B25-drones-09-00139" class="html-bibr">25</a>,<a href="#B28-drones-09-00139" class="html-bibr">28</a>].</p>
Full article ">Figure 5
<p>Comparison of communication cost with existing schemes [<a href="#B26-drones-09-00139" class="html-bibr">26</a>,<a href="#B27-drones-09-00139" class="html-bibr">27</a>,<a href="#B30-drones-09-00139" class="html-bibr">30</a>,<a href="#B31-drones-09-00139" class="html-bibr">31</a>,<a href="#B32-drones-09-00139" class="html-bibr">32</a>,<a href="#B33-drones-09-00139" class="html-bibr">33</a>].</p>
Full article ">Figure 6
<p>Comparison of batch signature verification delay with existing schemes [<a href="#B26-drones-09-00139" class="html-bibr">26</a>,<a href="#B27-drones-09-00139" class="html-bibr">27</a>,<a href="#B30-drones-09-00139" class="html-bibr">30</a>,<a href="#B31-drones-09-00139" class="html-bibr">31</a>,<a href="#B32-drones-09-00139" class="html-bibr">32</a>,<a href="#B33-drones-09-00139" class="html-bibr">33</a>].</p>
Full article ">
37 pages, 735 KiB  
Review
Blockchain-Assisted Self-Sovereign Identities on Education: A Survey
by Weilin Chan, Keke Gai, Jing Yu and Liehuang Zhu
Blockchains 2025, 3(1), 3; https://doi.org/10.3390/blockchains3010003 - 11 Feb 2025
Viewed by 540
Abstract
The education sector has witnessed a significant shift towards digitising student records, with relevant data now stored in centralized data repositories. While traditional identity management solutions in education are functional, they often face various challenges, including data privacy concerns, limited portability, and reliability [...] Read more.
The education sector has witnessed a significant shift towards digitising student records, with relevant data now stored in centralized data repositories. While traditional identity management solutions in education are functional, they often face various challenges, including data privacy concerns, limited portability, and reliability challenges. As the volume of student data continues to grow, inadequate data management practices have led to several problems. These include students losing control and empowerment over their educational information, increased vulnerability to potential data breaches and unauthorized access, a lack of transparency and accountability, data silos and inconsistencies, and administrative inefficiencies. To address these limitations, the implementation of a blockchain-assisted self-sovereign identity (Ba-SSI) concept in the education system presents a viable solution. Self-sovereign identity (SSI) represents a paradigm shift from traditional centralized identity systems, allowing individuals to maintain full control of their identity data without relying on centralized authorities. By leveraging the decentralized nature, SSI frameworks can ensure security, interoperability, and scalability, thereby improving user-centric identity management. This survey paper explores the potential of Ba-SSI within the context of education. It thoroughly reviews the current state of digital identity management in education, highlighting the limitations of conventional systems and the emerging role of blockchain technology in addressing these challenges. The paper discusses the fundamental principles of blockchain technology and how it can be utilized to enhance security, interoperability, and scalability in identity management. Additionally, it examines the insights and benefits of this approach for the education system. Finally, the paper concludes by addressing the issues, challenges, benefits, and future research directions in this domain, underscoring the potential of Ba-SSI solutions to revolutionize the management and empowerment of student data within the education sector. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains)
Show Figures

Figure 1

Figure 1
<p>Architecture of educational digital identity.</p>
Full article ">Figure 2
<p>The evolution of identity management models.</p>
Full article ">Figure 3
<p>Different identity management model comparisons.</p>
Full article ">Figure 4
<p>Verifiable credentials.</p>
Full article ">Figure 5
<p>Decentralized ID architecture.</p>
Full article ">Figure 6
<p>Cryptographic techniques.</p>
Full article ">Figure 7
<p>Main challenges in educational domain.</p>
Full article ">
15 pages, 675 KiB  
Article
Look at My Body: It Tells of Suffering—Understanding Psychiatric Pathology in Patients Who Suffer from Headaches, Restrictive Eating Disorders, or Non-Suicidal Self-Injuries (NSSIs)
by Diletta Cristina Pratile, Marika Orlandi, Adriana Carpani and Martina Maria Mensi
Pediatr. Rep. 2025, 17(1), 21; https://doi.org/10.3390/pediatric17010021 - 8 Feb 2025
Viewed by 342
Abstract
Background/Objectives: Adolescence is a developmental stage characterized by profound physical and psychological transformations, often leading to vulnerabilities such as body dissatisfaction, identity challenges, and the use of maladaptive coping strategies. This often leads to body-related psychopathologies, including headaches, restrictive eating disorders, and [...] Read more.
Background/Objectives: Adolescence is a developmental stage characterized by profound physical and psychological transformations, often leading to vulnerabilities such as body dissatisfaction, identity challenges, and the use of maladaptive coping strategies. This often leads to body-related psychopathologies, including headaches, restrictive eating disorders, and non-suicidal self-injury (NSSI). The present study aimed to describe the typical functioning and features of these conditions and the differences between the three groups, and to identify the most effective assessment for predicting these conditions. Methods: Sixty adolescent patients (51 female; mean age = 15.34 ± 1.80) were divided into three groups: headaches, restrictive eating disorders, and NSSI, and assessed for differences in symptoms, cognitive performance, personality, functioning, and illness severity using semi-structured interviews, clinician-based scales, and performance-based tests like the Rorschach inkblot test, according to the Rorschach Performance Assessment System (R-PAS). Results: Individuals with headaches experienced more internalizing symptoms, had an average IQ, maintained some functioning areas, and had distorted patterns of self–other relationships with the tendency to project malevolent aspects onto others. Patients with restrictive eating disorders had high levels of depressive symptoms, above-average IQ scores, negative symptoms, moderate presence of obsessive–compulsive personality traits, disorganized thinking, and a tendency to interpret situations subjectively. Patients with NSSI showed the highest level of depressive symptoms and social anxiety symptoms, and a considerable presence of psychotic symptoms and perceptual distortions. Negative symptoms, borderline personality traits, and psychosis symptoms had the strongest predictivity. Conclusions: The study provides clinicians with relevant insights into the features of these conditions and highlights assessment strategies, tailored interventions, and enhanced outcomes for these vulnerable populations. Full article
(This article belongs to the Special Issue Mental Health and Psychiatric Disorders of Children and Adolescents)
Show Figures

Figure 1

Figure 1
<p>Study population flowchart. [authors’ own processing].</p>
Full article ">Figure 2
<p>Research process. [authors’ own processing].</p>
Full article ">
18 pages, 254 KiB  
Article
The Use of Narratives as a Therapeutic Tool Among Latin American Immigrant Women: Processes of Reconstruction and Empowerment in Contexts of Vulnerability
by Mª Dolores Pereñíguez, José Palacios, Paloma Echevarría, Isabel Morales-Moreno and Aarón Muñoz
Healthcare 2025, 13(4), 362; https://doi.org/10.3390/healthcare13040362 - 8 Feb 2025
Viewed by 427
Abstract
Background/Objectives: This study explores how narratives can act as therapeutic tools for Latin American immigrant women residing in the Region of Murcia, Spain. The objective is to analyse how the act of narrating their migratory experiences contributes to emotional relief, the re-signification of [...] Read more.
Background/Objectives: This study explores how narratives can act as therapeutic tools for Latin American immigrant women residing in the Region of Murcia, Spain. The objective is to analyse how the act of narrating their migratory experiences contributes to emotional relief, the re-signification of their trajectories, and the construction of resilience, while strengthening identity and fostering a sense of belonging in contexts marked by exclusion and inequalities in gender and class. Methods: A qualitative methodology was used with a narrative and gender approach. The field work was carried out between 2022 and 2023, with a sample of 20 women selected through snowball sampling. Data were collected through in-depth interviews and analysed through an inductive approach using MAXQDA 24.5 software. The emerging categories reflected the emotional experience and meanings constructed during the migration process. Results: The narratives revealed five key categories: emotional relief of social suffering through expression, reconstruction of identity and re-signification of experiences, emotional validation and strengthening of identity, empowerment and symbolic resistance, and sense of belonging and connection. Likewise, it was observed that the interviews created therapeutic spaces that strengthened the bond between researcher and participant. Conclusions: The narratives contribute to processing emotions and redefining traumatic experiences, while also allowing greater agency in the participating women. This approach highlights the transformative potential of narrative research to generate situated knowledge and promote inclusive practices in contexts of vulnerability. Full article
(This article belongs to the Section Women's Health Care)
21 pages, 2113 KiB  
Article
Cultural Dimensions of Territorial Development: A Plan to Safeguard the Intangible Cultural Heritage of Guano’s Knotted Carpet Weaving Tradition, Chimborazo, Ecuador
by Claudia Patricia Maldonado-Erazo, Susana Monserrat Zurita-Polo, María de la Cruz del Río-Rama and José Álvarez-García
Heritage 2025, 8(2), 60; https://doi.org/10.3390/heritage8020060 - 5 Feb 2025
Viewed by 1075
Abstract
The current research article focuses on safeguarding the knotted carpet weaving tradition in Guano, an endangered intangible cultural heritage (ICH) threatened by globalisation and a lack of intergenerational transmission. The research aims to revitalise this artisanal technique through a comprehensive safeguarding plan, using [...] Read more.
The current research article focuses on safeguarding the knotted carpet weaving tradition in Guano, an endangered intangible cultural heritage (ICH) threatened by globalisation and a lack of intergenerational transmission. The research aims to revitalise this artisanal technique through a comprehensive safeguarding plan, using a participatory action research approach. Activities included in-depth interviews, workshops, and the documentation of seven key cultural practises related to the weaving, such as spinning, natural dyeing, and design. The study found that 86% of these practises are highly vulnerable. To address this, the research developed strategies to promote generational transmission, strengthen local collaboration, and connect the craft to territorial identity and sustainable tourism. Proposed actions include intergenerational education programmes, tourism initiatives, and local fairs to boost carpet marketing. The study contributes to the field of ICH by highlighting the role of cultural tourism in preserving at-risk artisanal techniques and community identity. It emphasizes the need for collaborative approaches to safeguard living heritage in a globalized world. The research findings underscore the importance of integrating traditional practices into modern contexts to ensure their long-term sustainability. Full article
(This article belongs to the Special Issue Heritage Tourism and Sustainable City Dynamics)
Show Figures

Figure 1

Figure 1
<p>Evolution of the relationship between ICH and safeguarding. Source: own elaboration.</p>
Full article ">Figure 2
<p>Work methodology proposed by the INPC. Source: [<a href="#B51-heritage-08-00060" class="html-bibr">51</a>].</p>
Full article ">Figure 3
<p>Stages performed at the time of recording events.</p>
Full article ">Figure 4
<p>Categories, variables, and criteria considered at the time of diagnosis of the manifestations.</p>
Full article ">Figure 5
<p>Inter-related sub-systems within Guano according to Clarke [<a href="#B39-heritage-08-00060" class="html-bibr">39</a>].</p>
Full article ">Figure 6
<p>Mapping of stakeholder networks.</p>
Full article ">
25 pages, 9363 KiB  
Article
Globalization and Architecture: Urban Homogenization and Challenges for Unprotected Heritage. The Case of Postmodern Buildings with Complex Geometric Shapes in the Ensanche of San Sebastián
by María Senderos, Maialen Sagarna, Juan Pedro Otaduy and Fernando Mora
Buildings 2025, 15(3), 497; https://doi.org/10.3390/buildings15030497 - 5 Feb 2025
Viewed by 665
Abstract
Globalization has profoundly impacted architecture by promoting urban homogenization, where global styles and materials overshadow local character. This shift prioritizes standardized functionality and energy efficiency over cultural identity, erasing regional architectural distinctiveness. In historical urban centers, globalization-driven interventions—such as ventilated facades or external [...] Read more.
Globalization has profoundly impacted architecture by promoting urban homogenization, where global styles and materials overshadow local character. This shift prioritizes standardized functionality and energy efficiency over cultural identity, erasing regional architectural distinctiveness. In historical urban centers, globalization-driven interventions—such as ventilated facades or external thermal insulation systems (ETISs)—often simplify original compositions and alter building materiality, texture, and color. The Ensanche of San Sebastián serves as a case study highlighting this issue. Despite its architectural richness, which includes neoclassical and modernist buildings primarily constructed with sandstone from the Igeldo quarry, unprotected buildings are at risk of unsympathetic renovations. Such changes can distort the identity of what is considered “everyday heritage”, encompassing the residential buildings and public spaces that shape the collective memory of cities. This study presents a replicable methodology for assessing the vulnerability of buildings to facade interventions. By utilizing tools like digital twins, point cloud modeling, and typological analysis, the research establishes criteria for interventions aimed at preserving architectural values. It emphasizes the importance of collaborative efforts with urban planning authorities and public awareness campaigns to safeguard heritage. Ultimately, protecting architectural identity requires balancing the goals of energy efficiency with cultural preservation. This approach ensures that urban landscapes maintain their historical and social significance amidst globalization pressures. Full article
(This article belongs to the Special Issue Selected Papers from the REHABEND 2024 Congress)
Show Figures

Figure 1

Figure 1
<p>DSRM simplified flow diagram.</p>
Full article ">Figure 2
<p>Buildings in the Ensanche of San Sebastián classified as stone sculptures.</p>
Full article ">Figure 3
<p>Site plan with the unprotected buildings of the Ensanche, the postmodern buildings with unique volumetry, and the San Martín 37 building.</p>
Full article ">Figure 4
<p>Photograph of the building located on Marina 8 street, prior to facade intervention (2013) and post-intervention (2022). Source: Google Maps.</p>
Full article ">Figure 5
<p>Building front of the odd numbers of C/San Martín. Case study building located at number 37, framed in a red rectangle. Restitution obtained with the free software Hugin (Hugin 2022.0.0).</p>
Full article ">Figure 6
<p>Number of unprotected buildings in the Ensanche classified by scenario.</p>
Full article ">Figure 7
<p>Characterization sheet of a building in the stage and sub-scenario and evaluation sheet of the vulnerability of a building in the stage and sub-scenario of a stone sculptural building.</p>
Full article ">Figure 8
<p>Scanning points at the intersection between Easo and San Martín streets and point cloud obtained for the survey of the facade of 37 San Martín Street.</p>
Full article ">Figure 9
<p>Model of the current state of the facade of the case study in Revit software and rendered image with finishes and textures.</p>
Full article ">Figure 10
<p>Simulation of a possible intervention of the envelope with the substitution of material and color and simplification of the geometry; cladding detail on the front of the curved balcony and replacement of metal railings with translucent glass.</p>
Full article ">Figure 11
<p>Simulations performed from the image on the left in different AI software (top Archivinci (Cigraph, Milan, Italy), middle Copilot (Microsoft 365 Copilot, 2025), and bottom PromeAI (PromeAI, 2025)).</p>
Full article ">Figure 12
<p>The sheet used to establish the specific intervention criteria for this building.</p>
Full article ">Figure 12 Cont.
<p>The sheet used to establish the specific intervention criteria for this building.</p>
Full article ">Figure 13
<p>@ck_armin social media account in Instagram.</p>
Full article ">
Back to TopTop